24 Deadly Sins of Software Security : Programming Flaws and How to Fix Them - Michael Howard

24 Deadly Sins of Software Security

Programming Flaws and How to Fix Them

By: Michael Howard, David LeBlanc, John Viega

Paperback | 15 September 2009 | Edition Number 1

At a Glance

Paperback


RRP $105.95

$74.50

30%OFF

or 4 interest-free payments of $18.63 with

 or 

Aims to ship in 25 to 30 business days

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive

Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities

Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilitiesUse of magic URLs, predictable cookies, and hidden form fieldsBuffer overrunsFormat string problemsInteger overflowsC++ catastrophesInsecure exception handlingCommand injectionFailure to handle errorsInformation leakageRace conditionsPoor usabilityNot updating easilyExecuting code with too much privilegeFailure to protect stored dataInsecure mobile codeUse of weak password-based systemsWeak random numbersUsing cryptography incorrectlyFailing to protect network trafficImproper use of PKITrusting network name resolution

More in Network Programming

Seven Concurrency Models in Seven Weeks : When Threads Unravel - Paul Butcher
Information Security : The Complete Reference, Second Edition - Mark Rhodes-Ousley
RFID Implementation - Dennis Brown

$204.90

Iptv Crash Course : Crash Course - Joseph W. Weber
Delivering Carrier Ethernet : Extending Ethernet Beyond the LAN - Abdul Kasim
Microsoft Windows Server 2008 : A Beginner's Guide - Marty Matthews
Microsoft Windows Server 2008 : The Complete Reference - Danielle Ruest
Fixed Mobile Convergence : McGraw-Hill Communications Series - Alex Shneyderman
Microsoft Exchange Server 2007 : The Complete Reference - Richard Luckett
Linux : The Complete Reference, Sixth Edition - Richard Petersen

RRP $108.96

$76.25

30%
OFF
Hacking Exposed Linux : Hacking Exposed - ISECOM

RRP $105.95

$74.50

30%
OFF
Hacking Exposed Cisco Networks : Hacking Exposed - Andrew Vladimirov

RRP $110.95

$77.40

30%
OFF